Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading
0 Comments

Security Comes In Two Parts--Don’t Neglect The Physical Half

Security Comes In Two Parts--Don’t Neglect The Physical Half

Physical security is more or less what it sounds like: security intended to protect the physical infrastructure that houses your business and your critical data. Many of the pieces of physical security will seem very familiar, even if you didn’t know the right terms for them.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Emoji History Point of Sale IT service Specifications Managed Services Provider Web Server Help Desk Cost Management Two-factor Authentication communications Motherboard Machine Learning Refrigeration Lithium-ion Battery Identities Social Media Redundancy Address Software eWaste Language Business Google Politics Phone System VPN Users Avoiding Downtime Telephone Systems Drones Licensing Website Business Technology Knowledge Mobile Office Cabling Risk Management Meetings Travel Save Time Finance Asset Tracking Co-managed IT Motion Sickness Bring Your Own Device Document Management Microsoft Office Email CCTV Permission The Internet of Things Vendor Management Data Recovery Personal Information Router Management Data Breach Chatbots Wires Wearable Technology Mail Merge Lenovo User Favorites Cameras Internet Automobile Upgrades Entrepreneur Best Practices IT Consultant Operations Hard Drives Network Cyber Monday Best Practice Apple Assessment Hacker Writing USB YouTube Downtime Outsourced IT Business Growth Regulations Software Tips Productivity Mirgation Disaster Techology Running Cable Tech Terms Websites Remote Monitoring Going Green Law Enforcement Firefox Save Money Patch Management OneNote Environment Hosted Solutions Communication Nanotechnology Telephony Infrastructure Employer-Employee Relationship Network Security Windows 10 Upgrade Backups Domains Artificial Intelligence Retail Firewall IT Services Gadgets 5G Internet Exlporer Electronic Health Records RMM Antivirus Buisness BYOD Time Management Security Facebook Virtualization Paperless Office Tech Support Screen Reader Budget Efficiency Business Intelligence IoT Cookies Monitoring Utility Computing Network Management Star Wars Office Tips Operating System IT Technicians Mouse Fraud Cloud Instant Messaging Connectivity Theft High-Speed Internet Encryption Dark Web Digital Payment Remote Monitoring and Management Outlook iPhone VoIP Wireless File Sharing Financial Taxes Piracy Security Cameras Gmail Staff Remote Computing Augmented Reality IT Management Technology Laws Cloud Computing Dark Data Unified Communications Error Analytics ROI Office 365 Public Speaking Tip of the Week Proactive IT Smart Technology Customer Relationship Management Social Work/Life Balance Data storage Intranet Google Wallet Big Data WannaCry Networking Shortcut Hiring/Firing Workplace Tips Consultation Cables Fleet Tracking Network Congestion Ransomware Managing Stress Vulnerabilities Computer Voice over Internet Protocol Social Engineering Office Storage Hard Disk Drive Computer Care Electronic Medical Records Servers Laptop Mobile Database Recycling Humor Settings Google Calendar Cyberattacks Supercomputer HIPAA Geography Webcam Monitors Net Neutrality Cortana Hosted Solution Google Maps Smartphones CIO Microsoft Mobile Device Malware Scary Stories Backup and Disaster Recovery Tablet Remote Worker Administration Software as a Service Robot Authorization Features Notifications Mobile Computing How To Information Technology Troubleshooting Smart Tech Saving Money Competition Fun Samsung Migration Information Scam Physical Security Test Technology Programming PDF Multi-Factor Security Passwords Processors Automation Chrome Internet of Things Windows 10 Cryptocurrency Legal Android Alerts PowerPoint Health Windows 8 Data Warehousing Comparison Black Market Bookmarks Legislation WPA3 Experience Undo Wasting Time User Tips Hacking Managed Service Hotspot Apps Private Cloud Heating/Cooling Data loss Data Virtual Desktop IT Consulting IT Support Computers IT Support Windows Modem Wireless Technology SaaS Tracking Managed IT Services Access Control Consulting Browser Sync G Suite WiFi User Error Enterprise Resource Planning End of Support Public Cloud Relocation Compliance Small Business Zero-Day Threat Server Virtual Private Network Blockchain Mobility Virtual Reality Business Computing Conferencing Flexibility Gadget Content Filtering GPS Sports Twitter Holiday Technology Tips IBM Virtual Assistant VoIP Microsoft Excel Halloween Business Owner Superfish Update Remote Workers Data Backup Money Productivity Read Only Identity Word Project Management IT solutions Windows 7 Printing Government LiFi Tech Term Smartphone Computer Repair Managed IT Service Typing IP Address Deep Learning Documents Crowdsourcing Uninterrupted Power Supply Digital Authentication Mobile Data Recovery Vulnerability Backup E-Commerce Business Continuity Search Mobile Device Management Customer Service Identity Theft Virus Permissions Unified Threat Management Distributed Denial of Service Managed Service Provider Tip of the week Digital Signature Cybersecurity Printer SharePoint Presentation Wi-Fi Cybercrime Mobile Device Managment Trending Data Management Employees Touchscreen Spam BDR Black Friday Maintenance Data Security Applications Computing Botnet Enterprise Content Management Privacy Safety Application Training Mobile Security Corporate Profile Professional Services Company Culture MSP How To Proactive Cache Solid State Drive Chromebook Development Cleaning Alert App Unified Threat Management Spyware Procurement Collaboration Notes Hacks Statistics Computing Infrastructure Employee-Employer Relationship Analyitcs Files Hackers Quick Tips IT Budget Disaster Recovery Google Docs Google Drive Unsupported Software Break Fix Healthcare Phishing Hardware Bluetooth Cooperation Display 3D Printing Password Hard Drive Consumers Social Networking Saving Time Marketing Business Management Education Current Events Disaster Resistance Innovation Mobile Devices Server Management Downloads Managed IT services Human Error Bitcoin Staffing Bandwidth Miscellaneous Administrator Managed IT Alt Codes

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code